2. 2 NextNine - Centralized OT Security Management for Distributed ICS/SCADA Environments
NextNine’s OT Security Management
• 10 years industrial
experience
• Top tier customers in Oil,
Gas, Mining, Chemicals,
Energy and Critical
Infrastructure
• 1000 end customers.
5000 installations
• VCs Funded; Profitable; Patents
• Most industrial vendors
and MSSPs as channels
NextNine OT Security Management Suite
3. 3
NextNine -Centralized OT Security Management for Distributed ICS/SCADA Environments
Material KnownIndustrial Cyber Attack (1) The Original Logic Bomb –1982 –Russia
CIA caused the Siberian gas pipeline to explode using software, without using traditional explosivesBlackout Worm –2003 -US
First Energy blowout that left eight states in the dark for days Titan Ray –2004 -US
FBI detected China originated attacks to NASA & Lockheed-Martin for espionage Stuxnet-2010 –Iran
Cyber worm destroying 1000 (fifth) of Iran’s nuclear centrifuges by spinning out of control. 60,000 computers were effectedFlame –2012 –Iran and Middle East countries
Recorded audio, including Skype conversation, keyboard activity, screenshots, and network traffic for espionageAramco –2012 –Saudi-Arabia
“Spear-phishing" attack that infected 30,000 computers but didn’t stop the oil flowing.
4. 4
NextNine -Centralized OT Security Management for Distributed ICS/SCADA EnvironmentsWater Tower Decoy –2012 –US
Malicious computer virus attacked a decoy water tower ICSSolarWorld–2012 –US
Industrial information (manufacturing metrics, production line information) stolenGlobal Ping –2013 –Worldwide
3.7M computers pinged. 114,000 manufacturing control systems vulnerable for attack. 13,000 without password. Utility Control-System Network –2012 –US
Attackers Compromised twice control-system networks of utilities Water Plant Pump –2013 –US
Foreign hackers caused a pump at an Illinois water plant to fail. Power plant malware –2013 -US
Viruses and sophisticated malware were found in the power plantsTarget Credit Cards Breach –2014 -US
40M credit cards and 70M shoppers personal details were compromised
Material KnownIndustrial Cyber Attack (2)
5. 5
NextNine -Centralized OT Security Management for Distributed ICS/SCADA Environments
DRAFT, Copyright (IC)3, 2014 5
12. -NextNine Confidential -
Subject: Infrastructure for Automated Remote Support
12“With NextNine, we gain complete visibility of our entire SCADA/ICS environment, enabling us to enforce our security policies, reduce cyber risks and meet compliance requirements.” (a major client testimonial)
Corporate
Plants
Devices
Set
Policy
Measure
Compliance
Present
Status
Implement
Policy
13. Subject: Infrastructure for Automated Remote Support - NextNine Confidential - 13
Shmulik Aran, CEO
saran@nextnine.com
+972-528-667480
www.NextNine.com
Thanks for the attention!
Enjoy IoT 2014!